EP3420673A4 - System und verfahren zur hierarchiemanipulation in einem verschlüsselungscodeverwaltungssystem - Google Patents

System und verfahren zur hierarchiemanipulation in einem verschlüsselungscodeverwaltungssystem Download PDF

Info

Publication number
EP3420673A4
EP3420673A4 EP17757246.8A EP17757246A EP3420673A4 EP 3420673 A4 EP3420673 A4 EP 3420673A4 EP 17757246 A EP17757246 A EP 17757246A EP 3420673 A4 EP3420673 A4 EP 3420673A4
Authority
EP
European Patent Office
Prior art keywords
encryption key
key management
management system
hierarchy manipulation
hierarchy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP17757246.8A
Other languages
English (en)
French (fr)
Other versions
EP3420673A1 (de
Inventor
Charles White
Gary C. GARDNER
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fornetix LLC
Original Assignee
Fornetix LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fornetix LLC filed Critical Fornetix LLC
Publication of EP3420673A1 publication Critical patent/EP3420673A1/de
Publication of EP3420673A4 publication Critical patent/EP3420673A4/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/12Replacement control
    • G06F12/121Replacement control using replacement algorithms
    • G06F12/128Replacement control using replacement algorithms adapted to multidimensional cache systems, e.g. set-associative, multicache, multiset or multilevel
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/62Details of cache specific to multiprocessor cache arrangements
    • G06F2212/621Coherency control relating to peripheral accessing, e.g. from DMA or I/O device

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Automation & Control Theory (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)
EP17757246.8A 2016-02-26 2017-02-23 System und verfahren zur hierarchiemanipulation in einem verschlüsselungscodeverwaltungssystem Withdrawn EP3420673A4 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201662300717P 2016-02-26 2016-02-26
US15/439,873 US10931653B2 (en) 2016-02-26 2017-02-22 System and method for hierarchy manipulation in an encryption key management system
PCT/US2017/019209 WO2017147343A1 (en) 2016-02-26 2017-02-23 System and method for hierarchy manipulation in an encryption key management system

Publications (2)

Publication Number Publication Date
EP3420673A1 EP3420673A1 (de) 2019-01-02
EP3420673A4 true EP3420673A4 (de) 2019-10-23

Family

ID=59678597

Family Applications (1)

Application Number Title Priority Date Filing Date
EP17757246.8A Withdrawn EP3420673A4 (de) 2016-02-26 2017-02-23 System und verfahren zur hierarchiemanipulation in einem verschlüsselungscodeverwaltungssystem

Country Status (5)

Country Link
US (2) US10931653B2 (de)
EP (1) EP3420673A4 (de)
AU (1) AU2017223725A1 (de)
CA (1) CA3015778A1 (de)
WO (1) WO2017147343A1 (de)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10630686B2 (en) 2015-03-12 2020-04-21 Fornetix Llc Systems and methods for organizing devices in a policy hierarchy
US10965459B2 (en) * 2015-03-13 2021-03-30 Fornetix Llc Server-client key escrow for applied key management system and process
US10880281B2 (en) 2016-02-26 2020-12-29 Fornetix Llc Structure of policies for evaluating key attributes of encryption keys
US10713077B2 (en) 2017-01-26 2020-07-14 Semper Fortis Solutions, LLC Multiple single levels of security (MSLS) in a multi-tenant cloud
US11113408B2 (en) * 2018-08-20 2021-09-07 Hewlett Packard Enterprise Development Lp Providing a secure object store using a hierarchical key system
US20230205935A1 (en) * 2021-12-28 2023-06-29 Ati Technologies Ulc Software assisted acceleration in cryptographic queue processing

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030018786A1 (en) * 2001-07-17 2003-01-23 Lortz Victor B. Resource policy management
US20050039031A1 (en) * 2003-01-31 2005-02-17 Mont Marco Casassa Privacy management of personal data

Family Cites Families (212)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4316055A (en) 1976-12-30 1982-02-16 International Business Machines Corporation Stream/block cipher crytographic system
US5889953A (en) 1995-05-25 1999-03-30 Cabletron Systems, Inc. Policy management and conflict resolution in computer networks
US8914410B2 (en) 1999-02-16 2014-12-16 Sonicwall, Inc. Query interface to policy server
US6466932B1 (en) * 1998-08-14 2002-10-15 Microsoft Corporation System and method for implementing group policy
US7673323B1 (en) * 1998-10-28 2010-03-02 Bea Systems, Inc. System and method for maintaining security in a distributed computer network
US6330562B1 (en) 1999-01-29 2001-12-11 International Business Machines Corporation System and method for managing security objects
US6539495B1 (en) * 1999-02-22 2003-03-25 International Business Machines Corporation Method, system and program products for providing user-managed duplexing of coupling facility cache structures
WO2001054374A2 (en) 2000-01-17 2001-07-26 Certicom Corp. Customized public key infrastructure and developing tool
WO2001088750A1 (en) * 2000-05-16 2001-11-22 Carroll Garrett O A document processing system and method
SE518491C2 (sv) * 2000-10-12 2002-10-15 Abb Ab Datorbaserat system och metod för behörighetskontroll av objekt
US7660902B2 (en) * 2000-11-20 2010-02-09 Rsa Security, Inc. Dynamic file access control and management
CA2326851A1 (en) 2000-11-24 2002-05-24 Redback Networks Systems Canada Inc. Policy change characterization method and apparatus
US20020091819A1 (en) * 2001-01-05 2002-07-11 Daniel Melchione System and method for configuring computer applications and devices using inheritance
JP4185363B2 (ja) * 2001-02-22 2008-11-26 ビーイーエイ システムズ, インコーポレイテッド トランザクション処理システムにおけるメッセージ暗号化及び署名のためのシステム及び方法
US7280990B2 (en) * 2001-08-07 2007-10-09 Ugs Corp. Method and system for designing and modeling a product in a knowledge based engineering environment
US7159125B2 (en) 2001-08-14 2007-01-02 Endforce, Inc. Policy engine for modular generation of policy for a flat, per-device database
US7050589B2 (en) 2001-08-17 2006-05-23 Sun Microsystems, Inc. Client controlled data recovery management
US7512676B2 (en) * 2001-09-13 2009-03-31 Network Foundation Technologies, Llc Systems for distributing data over a computer network and methods for arranging nodes for distribution of data over a computer network
US7499986B2 (en) * 2001-10-04 2009-03-03 International Business Machines Corporation Storage area network methods with event notification conflict resolution
US6678799B2 (en) * 2001-10-18 2004-01-13 Hewlett-Packard Development Company, Lp. Aggregation of cache-updates in a multi-processor, shared-memory system
US7478418B2 (en) * 2001-12-12 2009-01-13 Guardian Data Storage, Llc Guaranteed delivery of changes to security policies in a distributed system
US20040039594A1 (en) 2002-01-09 2004-02-26 Innerpresence Networks, Inc. Systems and methods for dynamically generating licenses in a rights management system
EP1479232B1 (de) 2002-02-27 2011-09-28 Opentv, Inc. Verfahren und vorrichtung zur bereitstellung eines hierarchischen sicherheitsprofilobjekts
US7451065B2 (en) * 2002-03-11 2008-11-11 International Business Machines Corporation Method for constructing segmentation-based predictive models
US7474657B2 (en) * 2002-04-30 2009-01-06 University Of Florida Research Foundation, Inc. Partitioning methods for dynamic router tables
US20030225778A1 (en) * 2002-05-28 2003-12-04 Craig Fisher System and methods for generating a customer specific catalog from a base catalog
KR100431210B1 (ko) 2002-08-08 2004-05-12 한국전자통신연구원 공개키 기반구조에서 인증서 정책 및 인증서 정책사상을이용한 인증서 검증서버에서의 인증서 검증방법
US7184550B2 (en) 2002-08-15 2007-02-27 Intel Corporation Method and apparatus for simultaneous decryption and re-encryption of publicly distributed content via stream ciphers
US7231664B2 (en) 2002-09-04 2007-06-12 Secure Computing Corporation System and method for transmitting and receiving secure data in a virtual private group
US7665125B2 (en) 2002-09-23 2010-02-16 Heard Robert W System and method for distribution of security policies for mobile devices
US7437752B2 (en) 2002-09-23 2008-10-14 Credant Technologies, Inc. Client architecture for portable device with security policies
US7665118B2 (en) 2002-09-23 2010-02-16 Credant Technologies, Inc. Server, computer memory, and method to support security policy maintenance and distribution
US7391724B2 (en) 2002-10-09 2008-06-24 Spyder Navigations, L.L.C. System and method with policy control function for multimedia broadcast/multicast system services
GB2394805A (en) 2002-10-31 2004-05-05 Hewlett Packard Co Determining when to revoke a key in an ancestral hierarchy key distribution system
GB2394803A (en) * 2002-10-31 2004-05-05 Hewlett Packard Co Management of security key distribution using an ancestral hierarchy
EP1563408A1 (de) * 2002-11-21 2005-08-17 Nokia Corporation VERFAHREN UND EINRICHTUNG ZUM DEFINIEREN VON OBJEKTEN MIT DER M GLICHKEIT ZUR ERSTELLUNG EINES EINRICHTUNGSVERWALTUNGSBAUMS F R MOBILKOMMUNIKATIONSGERûTE
US8332464B2 (en) 2002-12-13 2012-12-11 Anxebusiness Corp. System and method for remote network access
US7003117B2 (en) * 2003-02-05 2006-02-21 Voltage Security, Inc. Identity-based encryption system for secure data distribution
WO2004109443A2 (en) * 2003-06-02 2004-12-16 Liquid Machines, Inc. Managing data objects in dynamic, distributed and collaborative contexts
US7289632B2 (en) 2003-06-03 2007-10-30 Broadcom Corporation System and method for distributed security
WO2005000420A2 (en) * 2003-06-25 2005-01-06 Infinite Links, Llc Golf mat with advertising area
US7831693B2 (en) * 2003-08-18 2010-11-09 Oracle America, Inc. Structured methodology and design patterns for web services
US7200226B2 (en) 2003-09-04 2007-04-03 Intel Corporation Cipher block chaining decryption
US20050071439A1 (en) 2003-09-29 2005-03-31 Peter Bookman Mobility device platform
JP2007509382A (ja) 2003-09-29 2007-04-12 レルム システムズ インコーポレイテッド 可動性装置プラットフォーム
US20050086477A1 (en) 2003-10-16 2005-04-21 Taiwan Semiconductor Manufacturing Co. Integrate PGP and Lotus Notes to encrypt / decrypt email
US7653816B2 (en) 2003-12-30 2010-01-26 First Information Systems, Llc E-mail certification service
US9094699B2 (en) 2004-02-05 2015-07-28 Broadcom Corporation System and method for security key transmission with strong pairing to destination client
WO2005078606A2 (en) * 2004-02-11 2005-08-25 Storage Technology Corporation Clustered hierarchical file services
US7664828B2 (en) * 2004-02-20 2010-02-16 Microsoft Corporation Invalid policy detection
WO2005101270A1 (en) * 2004-04-12 2005-10-27 Intercomputer Corporation Secure messaging system
US7703073B2 (en) 2004-06-08 2010-04-20 Covia Labs, Inc. Device interoperability format rule set and method for assembling interoperability application package
US7478426B2 (en) 2004-07-20 2009-01-13 International Busines Machines Corporation Multi-field classification dynamic rule updates
WO2006064765A1 (ja) 2004-12-13 2006-06-22 Matsushita Electric Industrial Co., Ltd. 不正機器検出装置及び不正機器検出システム
US7607164B2 (en) 2004-12-23 2009-10-20 Microsoft Corporation Systems and processes for managing policy change in a distributed enterprise
US8099598B1 (en) 2005-01-03 2012-01-17 Gary Gang Liu Secure messaging system with automatic recipient enrollment
KR100675380B1 (ko) 2005-01-14 2007-01-29 삼성전자주식회사 저자원 디바이스와 공개키를 사용하는 일반 디바이스 간의인증 방법 및 시스템
US8074069B2 (en) 2005-02-24 2011-12-06 International Business Machines Corporation Reading a locked windows NFTS EFS encrypted computer file
US20110167470A1 (en) 2005-02-28 2011-07-07 Trust Digital, Llc Mobile data security system and methods
US8713667B2 (en) 2005-07-08 2014-04-29 Hewlett-Packard Development Company, L.P. Policy based cryptographic application programming interface in secure memory
US9425958B2 (en) 2005-08-05 2016-08-23 Hewlett Packard Enterprise Development Lp System, method and apparatus for cryptography key management for mobile devices
US20070071243A1 (en) 2005-09-23 2007-03-29 Microsoft Corporation Key validation service
WO2007034497A2 (en) 2005-09-26 2007-03-29 Postalguard Ltd. Secure data transmission
US8135958B2 (en) 2005-11-22 2012-03-13 International Business Machines Corporation Method, system, and apparatus for dynamically validating a data encryption operation
WO2007071040A1 (en) 2005-12-19 2007-06-28 Kryptiva Inc. System and method for providing certified proof of delivery receipts for electronic mail
US7877409B2 (en) * 2005-12-29 2011-01-25 Nextlabs, Inc. Preventing conflicts of interests between two or more groups using applications
EP1826944B1 (de) * 2006-02-27 2009-05-13 Research In Motion Limited Verfahren zum Personalisieren einer standardisierten IT-Richtlinie
US7836313B2 (en) * 2006-03-21 2010-11-16 Oracle America, Inc. Method and apparatus for constructing a storage system from which digital objects can be securely deleted from durable media
CN101444119A (zh) 2006-03-27 2009-05-27 意大利电信股份公司 在移动通信设备上实施安全策略的系统
US9002018B2 (en) 2006-05-09 2015-04-07 Sync Up Technologies Corporation Encryption key exchange system and method
US7822209B2 (en) 2006-06-06 2010-10-26 Red Hat, Inc. Methods and systems for key recovery for a token
JP2008022526A (ja) 2006-06-13 2008-01-31 Hitachi Ltd 属性証明書検証方法、属性認証局装置、サービス提供装置、および属性証明書検証システム
US8131719B2 (en) 2006-08-16 2012-03-06 International Business Machines Corporation Systems and methods for utilizing organization-specific classification codes
FR2905217B1 (fr) 2006-08-23 2008-12-19 Thales Sa Systeme et procede de gestion decentralisee d'un systeme securise delivrant differents services
US7779258B2 (en) 2006-09-22 2010-08-17 International Business Machines Corporation Method for controlling security function execution with a flexible, extendable, and non-forgable block
US8116455B1 (en) 2006-09-29 2012-02-14 Netapp, Inc. System and method for securely initializing and booting a security appliance
US8010784B2 (en) 2006-10-10 2011-08-30 Adobe Systems Incorporated Method and apparatus for achieving conformant public key infrastructures
US8538028B2 (en) 2006-11-20 2013-09-17 Toposis Corporation System and method for secure electronic communication services
US20080118070A1 (en) 2006-11-20 2008-05-22 6580874 Canada Inc. Open and distributed systems to provide secure email service
WO2008061344A1 (en) 2006-11-20 2008-05-29 Tet Hin Yeap System and method for secure electronic communication services
US8116456B2 (en) 2006-11-28 2012-02-14 Oracle International Corporation Techniques for managing heterogeneous key stores
US7849497B1 (en) * 2006-12-14 2010-12-07 Athena Security, Inc. Method and system for analyzing the security of a network
US20080216153A1 (en) 2007-03-02 2008-09-04 Aaltonen Janne L Systems and methods for facilitating authentication of network devices
WO2008128212A1 (en) 2007-04-12 2008-10-23 Ncipher Corporation Ltd. Method and system for identifying and managing encryption keys
US20080271022A1 (en) * 2007-04-27 2008-10-30 Motorola, Inc. Utilizing graphs to detect and resolve policy conflicts in a managed entity
US8584227B2 (en) 2007-05-09 2013-11-12 Microsoft Corporation Firewall with policy hints
US8296559B2 (en) 2007-05-31 2012-10-23 Red Hat, Inc. Peer-to-peer SMIME mechanism
JP4995651B2 (ja) * 2007-06-25 2012-08-08 パナソニック株式会社 木構造を持つ鍵管理ソフトウエアにおける、鍵使用の高速化手段、及び装置
KR20090002392A (ko) 2007-06-28 2009-01-09 주식회사 케이티프리텔 외장 메모리를 이용한 컨텐츠 공유 방법 및 시스템
US20090080658A1 (en) 2007-07-13 2009-03-26 Brent Waters Method and apparatus for encrypting data for fine-grained access control
US8332636B2 (en) 2007-10-02 2012-12-11 International Business Machines Corporation Secure policy differentiation by secure kernel design
FR2922392B1 (fr) 2007-10-12 2011-03-04 Thales Sa Dispositif et procede pour aiguiller des flux d'echange de valeurs publiques (ou non sensibles) permettant de creer des cles secretes communes entre plusieurs zones.
US8594321B2 (en) 2007-10-26 2013-11-26 International Business Machines Corporation Apparatus and method for operating a symmetric cipher engine in cipher-block chaining mode
US20090132557A1 (en) * 2007-11-19 2009-05-21 Cohen Richard J Using hierarchical groupings to organize grc guidelines, policies, categories, and rules
US20090144380A1 (en) 2007-11-21 2009-06-04 Kallman William R Peer-to-peer email
KR100930018B1 (ko) 2007-12-07 2009-12-07 주식회사 마크애니 디지털 정보 보안 시스템, 커널 드라이버 장치 및 디지털정보 보안 방법
US8347347B2 (en) 2008-01-09 2013-01-01 International Business Machines Corporation Password policy enforcement in a distributed directory when policy information is distributed
WO2009107351A1 (ja) 2008-02-25 2009-09-03 パナソニック株式会社 情報セキュリティ装置および情報セキュリティシステム
US8972447B2 (en) 2008-03-18 2015-03-03 International Business Machines Corporation Persistent object linkage using ghosting
FR2930663A1 (fr) 2008-04-25 2009-10-30 Thales Sa Procede pour gerer des equipements cryptographiques avec une administration unifiee
US8646049B2 (en) 2008-05-02 2014-02-04 Toposis Corporation Systems and methods for secure management of presence information for communication services
US9253154B2 (en) * 2008-08-12 2016-02-02 Mcafee, Inc. Configuration management for a capture/registration system
EP2166761A1 (de) 2008-09-19 2010-03-24 Nagravision S.A. Verfahren zur Stärkung der Zugriffsregeln auf ein Rundfunkprodukt durch ein Verwaltungszentrum
US8213620B1 (en) 2008-11-17 2012-07-03 Netapp, Inc. Method for managing cryptographic information
US20100146582A1 (en) 2008-12-04 2010-06-10 Dell Products L.P. Encryption management in an information handling system
GB2472491B (en) 2009-02-06 2013-09-18 Thales Holdings Uk Plc System and method for multilevel secure object management
US8837718B2 (en) 2009-03-27 2014-09-16 Microsoft Corporation User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store
US20100246828A1 (en) 2009-03-30 2010-09-30 David Johnston Method and system of parallelized data decryption and key generation
US8959353B2 (en) 2009-03-31 2015-02-17 Topaz Systems, Inc. Distributed system for multi-function secure verifiable signer authentication
US20100266132A1 (en) 2009-04-15 2010-10-21 Microsoft Corporation Service-based key escrow and security for device data
JP5349261B2 (ja) * 2009-04-23 2013-11-20 三菱電機株式会社 暗号処理システム、鍵生成装置、鍵委譲装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム
EP2658164B1 (de) 2009-04-24 2015-09-16 Nippon Telegraph And Telephone Corporation Kryptographisches Verfahren, kryptographisches Kommunikationsverfahren, Verschlüsselungsgerät, Schlüsselgenerierungsgerät, Entschlüsselungsgerät, Inhaltserver, Programm, und Datenträger
ES2365887B1 (es) 2009-05-05 2012-09-03 Scytl Secure Electronic Voting S.A. Metodo de verificacion de procesos de descifrado
US9626398B2 (en) * 2012-05-22 2017-04-18 Hewlett Packard Enterprise Development Lp Tree data structure
GB2471282B (en) 2009-06-22 2015-02-18 Barclays Bank Plc Method and system for provision of cryptographic services
US20110113235A1 (en) 2009-08-27 2011-05-12 Craig Erickson PC Security Lock Device Using Permanent ID and Hidden Keys
US8630422B2 (en) 2009-11-10 2014-01-14 International Business Machines Corporation Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus
US8447734B2 (en) * 2009-11-30 2013-05-21 Hewlett-Packard Development Company, L.P. HDAG backup system with variable retention
US9037711B2 (en) 2009-12-02 2015-05-19 Metasecure Corporation Policy directed security-centric model driven architecture to secure client and cloud hosted web service enabled processes
JP5334873B2 (ja) * 2010-01-08 2013-11-06 三菱電機株式会社 暗号処理システム、鍵生成装置、鍵委譲装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム
US8539220B2 (en) 2010-02-26 2013-09-17 Microsoft Corporation Secure computation using a server module
FR2958101A1 (fr) 2010-03-26 2011-09-30 Ntx Res Infrastructure de gestion de bi-cles de securite de personnes physiques (igcp/pki)
US20110296171A1 (en) 2010-05-28 2011-12-01 Christina Fu Key recovery mechanism
US8661499B2 (en) 2010-07-07 2014-02-25 Ca, Inc. Dynamic policy trees for matching policies
KR101418254B1 (ko) 2010-07-23 2014-07-10 니폰 덴신 덴와 가부시끼가이샤 암호 시스템, 암호 통신 방법, 암호화 장치, 키 생성 장치, 복호 장치, 콘텐츠 서버 장치, 프로그램, 기억매체
WO2012016091A2 (en) 2010-07-28 2012-02-02 Nextlabs, Inc. Protecting documents using policies and encryption
GB2483167B (en) 2010-08-27 2013-05-29 Fxi Technologies As Storage device with separate application and interface processors
US10122693B2 (en) 2010-10-25 2018-11-06 International Business Machines Corporation Protocol based key management
US9053339B2 (en) 2010-10-27 2015-06-09 Hytrust, Inc. System and method for secure storage of virtual machines
JP4892093B1 (ja) 2010-11-09 2012-03-07 株式会社東芝 認証連携システム及びidプロバイダ装置
US9589145B2 (en) 2010-11-24 2017-03-07 Oracle International Corporation Attaching web service policies to a group of policy subjects
US8719253B2 (en) 2010-12-01 2014-05-06 Cisco Technology, Inc. Method and apparatus for efficiently organizing hierarchical QoS policies
US8996863B2 (en) * 2010-12-03 2015-03-31 Yacov Yacobi Attribute-based access-controlled data-storage system
US10817421B2 (en) * 2010-12-13 2020-10-27 Sandisk Technologies Llc Persistent data structures
US8479008B2 (en) 2010-12-15 2013-07-02 Microsoft Corporation Providing security services on the cloud
US8352749B2 (en) 2010-12-17 2013-01-08 Google Inc. Local trusted services manager for a contactless smart card
US9083526B2 (en) 2011-04-29 2015-07-14 International Business Machines Corporation Fully homomorphic encryption
CN103548020B (zh) * 2011-05-12 2017-06-27 华为技术有限公司 用于由小树进行的大小可变分层名称的最长前缀匹配的方法和系统
US8621483B2 (en) 2011-06-20 2013-12-31 Nokia Corporation Methods, apparatuses and computer program products for provisioning applications to in vehicle infotainment systems with secured access
US8707026B2 (en) 2011-07-13 2014-04-22 International Business Machines Corporation Apparatus for certificate-based cookie security
US8798273B2 (en) 2011-08-19 2014-08-05 International Business Machines Corporation Extending credential type to group Key Management Interoperability Protocol (KMIP) clients
US20130044882A1 (en) 2011-08-19 2013-02-21 International Business Machines Corporation Enhancing provisioning for keygroups using key management interoperability protocol (KMIP)
US10211984B2 (en) 2011-09-28 2019-02-19 Koninklijke Philips N.V. Hierarchical attribute-based encryption and decryption
US20130097123A1 (en) 2011-10-18 2013-04-18 Research In Motion Limited Method and System for Determining Eligible Communication Partners Utilizing an Entity Discovery Engine
US9489528B2 (en) 2011-12-12 2016-11-08 Microsoft Technology Licensing, Llc Single use recovery key
US10133662B2 (en) 2012-06-29 2018-11-20 Sandisk Technologies Llc Systems, methods, and interfaces for managing persistent data of atomic storage operations
US9166777B2 (en) 2012-03-05 2015-10-20 Echoworx Corporation Method and system for user authentication for computing devices utilizing PKI and other user credentials
JP5680007B2 (ja) * 2012-03-06 2015-03-04 三菱電機株式会社 暗号システム、暗号方法及び暗号プログラム
US9465950B2 (en) 2012-03-06 2016-10-11 Nokia Technologies Oy Methods, apparatuses, and computer-readable storage media for securely accessing social networking data
CN103368901A (zh) 2012-03-27 2013-10-23 复旦大学 基于大规模离散数据的云计算系统
US8843739B2 (en) 2012-04-04 2014-09-23 Lockheed Martin Corporation Anti-tamper device, system, method, and computer-readable medium
US9130837B2 (en) 2012-05-22 2015-09-08 Cisco Technology, Inc. System and method for enabling unconfigured devices to join an autonomic network in a secure manner
US9448900B2 (en) * 2012-06-25 2016-09-20 Storone Ltd. System and method for datacenters disaster recovery
JP5960820B2 (ja) * 2012-07-09 2016-08-02 株式会社Murakumo ツリー構造の管理方法、情報処理システム、及び、プログラム
US9294508B2 (en) * 2012-08-02 2016-03-22 Cellsec Inc. Automated multi-level federation and enforcement of information management policies in a device network
US9256763B2 (en) 2012-09-03 2016-02-09 Nec Europe Ltd. Method and system for providing a public key/secret key pair for encrypting and decrypting data
CN104641591B (zh) * 2012-09-21 2018-02-02 诺基亚技术有限公司 用于基于信任级别提供对共享数据的访问控制的方法和装置
US10210175B2 (en) * 2012-09-28 2019-02-19 Oracle International Corporation Techniques for lifecycle state management and in-database archiving
US9418209B2 (en) 2012-10-02 2016-08-16 Google Technology Holdings LLC Systems and methods for manipulating sensitive information in a secure mobile environment
US9392077B2 (en) 2012-10-12 2016-07-12 Citrix Systems, Inc. Coordinating a computing activity across applications and devices having multiple operation modes in an orchestration framework for connected devices
US9342666B2 (en) 2012-10-31 2016-05-17 Intel Corporation Providing security support for digital rights management in different formats
US8990883B2 (en) 2013-01-02 2015-03-24 International Business Machines Corporation Policy-based development and runtime control of mobile applications
US8559631B1 (en) 2013-02-09 2013-10-15 Zeutro Llc Systems and methods for efficient decryption of attribute-based encryption
US9578061B2 (en) * 2013-03-13 2017-02-21 FireMon, LLC System and method for modeling a networking device policy
US9705850B2 (en) * 2013-03-15 2017-07-11 Arizona Board Of Regents On Behalf Of Arizona State University Enabling comparable data access control for lightweight mobile devices in clouds
US9716728B1 (en) 2013-05-07 2017-07-25 Vormetric, Inc. Instant data security in untrusted environments
US10681023B2 (en) 2013-06-28 2020-06-09 Ssh Communications Security Oyj Self-service portal for provisioning passwordless access
FR3009163B1 (fr) 2013-07-25 2015-09-04 Thales Sa Procede pour l'echange en securite d'une donnee sur un reseau ad-hoc mettant en oeuvre un service de diffusion xcast; noeud associe
US9124430B2 (en) 2013-09-23 2015-09-01 Venafi, Inc. Centralized policy management for security keys
US9083752B2 (en) 2013-10-01 2015-07-14 Codeproof Technologies, Inc. Mobile device management as a simplified online software service
KR101754308B1 (ko) 2013-10-04 2017-07-07 한국전자통신연구원 모바일 민감 데이터 관리 방법 및 이를 수행하는 위탁 서버
EA035011B1 (ru) 2013-10-07 2020-04-16 ФОРНЕТИКС ЭлЭлСи Способ управления, объединения и распространения ключей шифрования
US9087205B2 (en) 2013-10-11 2015-07-21 Sap Se Shared encrypted storage
US9712390B2 (en) * 2013-11-04 2017-07-18 Amazon Technologies, Inc. Encoding traffic classification information for networking configuration
US9213764B2 (en) 2013-11-22 2015-12-15 Sap Se Encrypted in-memory column-store
US9756048B2 (en) * 2013-11-24 2017-09-05 Truly Protect Oy System and methods for executing encrypted managed programs
US9639589B1 (en) * 2013-12-20 2017-05-02 Amazon Technologies, Inc. Chained replication techniques for large-scale data streams
US9654922B2 (en) 2014-03-21 2017-05-16 Venafi, Inc. Geo-fencing cryptographic key material
US9626400B2 (en) * 2014-03-31 2017-04-18 Sandisk Technologies Llc Compaction of information in tiered data structure
US9626399B2 (en) * 2014-03-31 2017-04-18 Sandisk Technologies Llc Conditional updates for reducing frequency of data modification operations
US9537854B2 (en) 2014-04-18 2017-01-03 Symantec Corporation Transmitting encoded digital certificate data to certificate authority using mobile device
US9565227B1 (en) * 2014-06-16 2017-02-07 Teradici Corporation Composition control method for remote application delivery
US9774577B2 (en) 2014-06-24 2017-09-26 Tata Consultancy Services Limited Device, system and method providing data security and attribute based data access in participatory sensing
US10067722B2 (en) * 2014-07-02 2018-09-04 Hedvig, Inc Storage system for provisioning and storing data to a virtual disk
US9571463B2 (en) 2014-07-14 2017-02-14 Raytheon Bbn Technologies Corp. Policy-based access control in content networks
WO2016025321A1 (en) * 2014-08-13 2016-02-18 OneCloud Labs, Inc. Replication of virtualized infrastructure within distributed computing environments
US10462114B2 (en) 2014-09-07 2019-10-29 Definitive Data Security, Inc. System and associated software for providing advanced data protections in a defense-in-depth system by integrating multi-factor authentication with cryptographic offloading
US9716716B2 (en) 2014-09-17 2017-07-25 Microsoft Technology Licensing, Llc Establishing trust between two devices
US10592093B2 (en) * 2014-10-09 2020-03-17 Splunk Inc. Anomaly detection
US9495545B2 (en) 2014-11-13 2016-11-15 Sap Se Automatically generate attributes and access policies for securely processing outsourced audit data using attribute-based encryption
SG11201701066XA (en) * 2014-11-19 2017-03-30 Informex Inc Data retrieval apparatus, program and recording medium
US10594484B2 (en) 2015-02-13 2020-03-17 Yoti Holding Limited Digital identity system
US9626245B2 (en) * 2015-02-20 2017-04-18 Netapp, Inc. Policy based hierarchical data protection
US10560440B2 (en) 2015-03-12 2020-02-11 Fornetix Llc Server-client PKI for applied key management system and process
US10630686B2 (en) * 2015-03-12 2020-04-21 Fornetix Llc Systems and methods for organizing devices in a policy hierarchy
US9967289B2 (en) * 2015-03-12 2018-05-08 Fornetix Llc Client services for applied key management systems and processes
US10965459B2 (en) 2015-03-13 2021-03-30 Fornetix Llc Server-client key escrow for applied key management system and process
US9680649B2 (en) 2015-03-19 2017-06-13 Oracle International Corporation Policy-based key sharing
US9660969B2 (en) 2015-03-31 2017-05-23 Here Global B.V. Method and apparatus for providing key management for data encryption for cloud-based big data environments
US10339106B2 (en) * 2015-04-09 2019-07-02 Commvault Systems, Inc. Highly reusable deduplication database after disaster recovery
US9871816B2 (en) * 2015-04-26 2018-01-16 Y.G. Noobaa Ltd. Systems and methods for security management of multi-client based distributed storage
US9591000B2 (en) 2015-06-19 2017-03-07 Oracle International Corporation Methods, systems, and computer readable media for authorization frameworks for web-based applications
US10257175B2 (en) * 2015-09-28 2019-04-09 Fornetix Llc Encryption deployment discovery
US9830470B2 (en) 2015-10-09 2017-11-28 Sap Se Encrypting data for analytical web applications
SE544816C2 (en) * 2015-11-25 2022-11-29 Teamifier Inc Apparatuses for graphically representing a reconfigured portion of a directed acyclic graph as a hierarchical tree structure
US10860086B2 (en) 2016-02-26 2020-12-08 Fornetix Llc Policy-enabled encryption keys having complex logical operations
US10880281B2 (en) 2016-02-26 2020-12-29 Fornetix Llc Structure of policies for evaluating key attributes of encryption keys
US10523645B2 (en) 2016-10-21 2019-12-31 Thales Esecurity, Inc. Method and system for protecting user data using individualized keys to enable secure compartmentalized data backup/restore
US10078552B2 (en) * 2016-12-29 2018-09-18 Western Digital Technologies, Inc. Hierarchic storage policy for distributed object storage systems
US10547598B2 (en) 2017-02-13 2020-01-28 Thales Esecurity, Inc. Abstracted cryptographic material management across multiple service providers
US10721079B2 (en) 2017-04-05 2020-07-21 Venafi, Inc. Detection of anomalous key material
FR3076423B1 (fr) 2017-12-28 2020-01-31 Thales Procede et systeme d'activation cryptographique d'une pluralite d'equipements

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030018786A1 (en) * 2001-07-17 2003-01-23 Lortz Victor B. Resource policy management
US20050039031A1 (en) * 2003-01-31 2005-02-17 Mont Marco Casassa Privacy management of personal data

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "chmod - Wikipedia", 1 December 2015 (2015-12-01), XP055621754, Retrieved from the Internet <URL:https://en.wikipedia.org/w/index.php?title=Chmod&oldid=693340984> [retrieved on 20190912] *
ANONYMOUS: "File system permissions", 27 February 2015 (2015-02-27), XP055487883, Retrieved from the Internet <URL:https://en.wikipedia.org/w/index.php?title=File_system_permissions&oldid=649024735> [retrieved on 20180626] *
ANONYMOUS: "How ACL inheritance works", 28 February 2014 (2014-02-28), XP055487629, Retrieved from the Internet <URL:https://library.netapp.com/ecmdocs/ECMP1401220/html/GUID-9320A39F-F278-4368-B8AB-561856881E5F.html> [retrieved on 20180625] *
See also references of WO2017147343A1 *

Also Published As

Publication number Publication date
EP3420673A1 (de) 2019-01-02
US10931653B2 (en) 2021-02-23
US20170250966A1 (en) 2017-08-31
CA3015778A1 (en) 2017-08-31
AU2017223725A1 (en) 2018-09-13
US20210185026A1 (en) 2021-06-17
WO2017147343A1 (en) 2017-08-31

Similar Documents

Publication Publication Date Title
EP3602954A4 (de) Verfahren und system zur hierarchischen kryptografischen schlüsselverwaltung
EP3453135A4 (de) System und verfahren zur verschlüsselung und entschlüsselung auf der basis der quantenschlüsselverteilung
EP3711259A4 (de) Verfahren und system zur quantenschlüsselverteilung und datenverarbeitung
EP3417569A4 (de) System und verfahren zur quantenschlüsselverteilung
EP3776288A4 (de) System und verfahren zur kryptografischen schlüsselsicherheit in der cloud
EP3410327A4 (de) Verfahren und system zur verwaltung von rechten
EP3443706A4 (de) System und verfahren zur validierung und durchführung von operationen auf homomorphisch verschlüsselten daten
EP3055947A4 (de) System und verfahren zur verschlüsselungsschlüsselverwaltung, -vereinheitlichung und -verteilung
EP3485583A4 (de) System und verfahren zur benutzergeräteoperationsverwaltung
EP3481000A4 (de) Verfahren und vorrichtung zum konfigurieren eines schlüssels und bestimmung einer sicherheitspolitik
EP3460765A4 (de) Verfahren und system zur verwaltung von banknoten
EP3220572A4 (de) Schlüsselverwaltungsverfahren, fahrzeugmontiertes netzwerksystem und schlüsselverwaltungsvorrichtung
EP3213458A4 (de) Verfahren, vorrichtung und system zur quantenschlüsselverteilung, privatsphärenverstärkung und datenübertragung
EP3459000A4 (de) Verfahren und verwaltung von angewandter kryptografischer ip
EP3420673A4 (de) System und verfahren zur hierarchiemanipulation in einem verschlüsselungscodeverwaltungssystem
EP3361469A4 (de) Geheimabrufsystem, verwaltungsvorrichtung, geheimabrufverfahren und geheimabrufprogramm
SG11201708750TA (en) Network system, and methods of encrypting data, decrypting encrypted data in the same
EP3118771A4 (de) Verfahren und vorrichtung zur verwaltung vertraulicher daten sowie sicherheitsauthentifizierungsverfahren und system
EP3644574A4 (de) Schlüsselverwaltungsverfahren und gerät und vorrichtung
EP3334085A4 (de) Verwaltungsvorrichtung, verwaltungssystem, schlüsselerzeugungsvorrichtung, schlüsselerzeugungssystem, schlüsselverwaltungssystem, fahrzeug, verwaltungsverfahren, schlüsselerzeugungsverfahren und computerprogramm
EP3598714A4 (de) Verfahren, vorrichtung und system zur verschlüsselung eines geheimen schlüssels
EP3547606A4 (de) Verfahren zur verwaltung von erlaubnissen, zugehörige vorrichtung und system
EP3158497A4 (de) Verfahren und vorrichtungen zur schlüsselverwaltung in einem as-a-service-kontext
EP3704829B8 (de) System und verfahren zur erzeugung eines kryptografischen schlüssels
EP3672145A4 (de) Stufenlose quantenschlüsselverteilungsvorrichtung und verfahren

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20180904

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20190920

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 9/14 20060101ALI20190916BHEP

Ipc: H04L 29/06 20060101ALI20190916BHEP

Ipc: H04L 9/08 20060101AFI20190916BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20201201

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20230316